3 # Jailhouse, a Linux-based partitioning hypervisor
5 # Copyright (c) Siemens AG, 2014
7 # This work is licensed under the terms of the GNU GPL, version 2. See
8 # the COPYING file in the top-level directory.
10 # This script should help to create a basic jailhouse configuration file.
11 # It needs to be executed on the target machine, where it will gather
12 # information about the system. For more advanced scenarios you will have
13 # to change the generated C-code.
15 from __future__ import print_function
21 from mako.template import Template
23 abspath = os.path.abspath(os.path.dirname(sys.argv[0]))
25 # pretend to be part of the jailhouse tool
26 sys.argv[0] = sys.argv[0].replace('-', ' ')
28 parser = argparse.ArgumentParser()
29 parser.add_argument('-g', '--generate-collector',
30 help='generate a script to collect input files on '
33 parser.add_argument('-r', '--root',
34 help='gather information in ROOT/, the default is "/" '
35 'which means creating a config for localhost',
39 parser.add_argument('-t', '--template-dir',
40 help='the directory where the templates are located,'
41 'the default is "' + abspath + '"',
46 memargs = [['--mem-inmates', '2M', 'inmate'],
47 ['--mem-hv', '64M', 'hypervisor']]
50 parser.add_argument(entry[0],
51 help='the amount of ' + entry[2] +
52 ' memory, default is "' + entry[1] +
53 '", format "xxx[K|M|G]"',
58 parser.add_argument('file', metavar='FILE',
59 help='name of file to write out',
62 options = parser.parse_args()
64 inputs = {'files': set(), 'files_opt': set(), 'dirs': set()}
67 def kmg_multiply(value, kmg):
68 if (kmg == 'K' or kmg == 'k'):
70 if (kmg == 'M' or kmg == 'm'):
71 return 1024**2 * value
72 if (kmg == 'G' or kmg == 'g'):
73 return 1024**3 * value
77 def kmg_multiply_str(str):
78 m = re.match(r'([0-9a-fA-FxX]+)([KMG]?)', str)
80 return kmg_multiply(int(m.group(1)), m.group(2))
81 raise RuntimeError('kmg_multiply_str can not parse input "' + str + '"')
85 def input_open(name, mode='r', optional=False):
86 inputs['files_opt' if optional else 'files'].add(name)
88 f = open(options.root + name, mode)
89 except Exception as e:
90 if optional or options.generate_collector:
91 return open("/dev/null", mode)
96 def input_readline(name, optional=False):
97 f = input_open(name, optional=optional)
103 def input_listdir(dir, wildcards):
105 inputs['dirs'].add(os.path.join(dir, w))
106 if options.generate_collector:
108 dirs = os.listdir(options.root + dir)
114 def __init__(self, id, start, len, flags, content, msix_address):
119 self.content = content
120 self.msix_address = msix_address
123 def __eq__(self, other):
124 return self.id == other.id and self.start == other.start and \
125 self.len == other.len and self.flags == other.flags
128 RW = 'JAILHOUSE_PCICAPS_WRITE'
131 def parse_pcicaps(dir):
133 f = input_open(os.path.join(dir, 'config'), 'rb')
135 (status,) = struct.unpack('<H', f.read(2))
136 # capability list supported?
137 if (status & (1 << 4)) == 0:
140 # walk capability list
142 (next,) = struct.unpack('B', f.read(1))
147 (id, next) = struct.unpack('<BB', f.read(2))
148 if id == 0x01: # Power Management
149 # this cap can be handed out completely
151 flags = PCICapability.RW
152 elif id == 0x05: # MSI
153 # access will be moderated by hypervisor
155 (msgctl,) = struct.unpack('<H', f.read(2))
156 if (msgctl & (1 << 7)) != 0: # 64-bit support
158 if (msgctl & (1 << 8)) != 0: # per-vector masking support
160 flags = PCICapability.RW
161 elif id == 0x11: # MSI-X
162 # access will be moderated by hypervisor
164 (table,) = struct.unpack('<xxI', f.read(6))
165 f.seek(0x10 + (table & 7) * 4)
166 (bar,) = struct.unpack('<I', f.read(4))
168 raise RuntimeError('Invalid MSI-X BAR found')
170 bar |= struct.unpack('<I', f.read(4))[0] << 32
171 msix_address = (bar & 0xfffffffffffffff0) + table & 0xfffffff8
172 flags = PCICapability.RW
174 # unknown/unhandled cap, mark its existence
176 flags = PCICapability.RD
178 content = f.read(len - 2)
179 caps.append(PCICapability(id, cap, len, flags, content,
185 def __init__(self, type, domain, bus, dev, fn, caps):
193 self.num_caps = len(caps)
194 self.num_msi_vectors = 0
196 self.num_msix_vectors = 0
197 self.msix_region_size = 0
198 self.msix_address = 0
200 if c.id in (0x05, 0x11):
201 msg_ctrl = struct.unpack('<H', c.content[:2])[0]
202 if c.id == 0x05: # MSI
203 self.num_msi_vectors = 1 << ((msg_ctrl >> 1) & 0x7)
204 self.msi_64bits = (msg_ctrl >> 7) & 1
206 vectors = (msg_ctrl & 0x7ff) + 1
207 self.num_msix_vectors = vectors
208 self.msix_region_size = (vectors * 16 + 0xfff) & 0xf000
209 self.msix_address = c.msix_address
212 return 'PCIDevice: %02x:%02x.%x' % (self.bus, self.dev, self.fn)
215 return self.bus << 8 | self.dev << 3 | self.fn
218 def parse_pcidevice_sysfsdir(basedir, dir):
219 dpath = os.path.join(basedir, dir)
220 dclass = input_readline(os.path.join(dpath, 'class'))
221 if re.match(r'0x0604..', dclass):
222 type = 'JAILHOUSE_PCI_TYPE_BRIDGE'
224 type = 'JAILHOUSE_PCI_TYPE_DEVICE'
226 domain = int(a[0], 16)
229 caps = PCICapability.parse_pcicaps(dpath)
230 return PCIDevice(type, domain, bus, int(df[0], 16), int(df[1], 16),
235 def __init__(self, start, stop, typestr, comments=None):
238 self.typestr = typestr
242 self.comments = comments
245 return 'MemRegion: %08x-%08x : %s' % \
246 (self.start, self.stop, self.typestr)
249 # round up to full PAGE_SIZE
250 return int((self.stop - self.start + 0xfff) / 0x1000) * 0x1000
252 def flagstr(self, p=''):
254 self.typestr == 'System RAM' or
255 self.typestr == 'RAM buffer' or
256 self.typestr == 'ACPI DMAR RMRR'
258 s = 'JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE |\n'
259 s += p + '\t\tJAILHOUSE_MEM_EXECUTE | JAILHOUSE_MEM_DMA'
261 return 'JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE'
264 class IOMemRegionTree:
265 def __init__(self, region, level, linenum):
267 self.linenum = linenum
270 self.children = set()
275 s = (' ' * (self.level - 1)) + str(self.region) + ' line %d' \
277 if self.parent and self.parent.region:
278 s += '--> ' + self.parent.region.typestr + ' line %d' \
279 % (self.parent.linenum)
281 for c in self.children:
286 def parse_iomem_line(line):
287 a = line.split(':', 1)
288 level = int(a[0].count(' ') / 2) + 1
289 region = a[0].split('-', 1)
291 return level, MemRegion(int(region[0], 16), int(region[1], 16), a[1])
294 def parse_iomem_file():
295 root = IOMemRegionTree(None, 0, -1)
296 f = input_open('/proc/iomem')
301 (level, r) = IOMemRegionTree.parse_iomem_line(line)
302 t = IOMemRegionTree(r, level, linenum)
303 if (t.level > lastlevel):
305 if (t.level == lastlevel):
306 t.parent = lastnode.parent
307 if (t.level < lastlevel):
309 while(t.level < p.level):
313 t.parent.children.add(t)
321 # recurse down the tree
323 def parse_iomem_tree(tree):
327 for tree in tree.children:
331 # System RAM on first level will be added without digging deeper
332 if (tree.level == 1 and s == 'System RAM'):
334 linenumbers.append(tree.linenum)
337 # blacklisted on all levels
339 (s.find('PCI MMCONFIG') >= 0) or
340 (s.find('APIC') >= 0) or # covers both APIC and IOAPIC
341 (s.find('dmar') >= 0)
345 # generally blacklisted, unless we find an HPET right behind it
347 if (s == 'reserved'):
348 for subtree in tree.children:
350 if (r2.typestr.find('HPET') >= 0):
352 linenumbers.append(subtree.linenum)
355 # if the tree continues recurse further down ...
356 if (len(tree.children) > 0):
357 ln2, r2 = IOMemRegionTree.parse_iomem_tree(tree)
358 linenumbers.extend(ln2)
362 # add all remaining leaves
364 linenumbers.append(tree.linenum)
366 return linenumbers, regions
370 (maxsz, tree) = IOMemRegionTree.parse_iomem_file()
372 # create a spare array so we can easiely keep the order from the file
373 regions = [None for x in range(maxsz)]
375 lines, regs = IOMemRegionTree.parse_iomem_tree(tree)
381 # now prepare a non-sparse array for a return value
387 # newer Linux kernels will report the first page as reserved
388 # it is needed for CPU init so include it anyways
389 if (ret[0].typestr == 'System RAM' and ret[0].start == 0x1000):
395 def parse_pcidevices():
398 basedir = '/sys/bus/pci/devices'
399 list = input_listdir(basedir, ['*/class', '*/config'])
401 d = PCIDevice.parse_pcidevice_sysfsdir(basedir, dir)
405 # look for duplicate capability patterns
407 if d2.caps == d.caps:
408 # reused existing capability list, but record all users
409 d2.caps[0].comments.append(str(d))
410 d.caps_start = d2.caps_start
414 d.caps[0].comments.append(str(d))
415 d.caps_start = len(caps)
418 return (devices, caps)
422 line = input_readline('/proc/cmdline')
423 m = re.match(r'.*memmap=([0-9a-fA-FxX]+)([KMG]?)\$'
424 '([0-9a-fA-FxX]+)([KMG]?).*',
427 size = kmg_multiply(int(m.group(1), 0), m.group(2))
428 start = kmg_multiply(int(m.group(3), 0), m.group(4))
433 def alloc_mem(regions, size):
435 for r in reversed(regions):
436 if (r.typestr == 'System RAM' and r.size() >= mem[1]):
440 raise RuntimeError('failed to allocate memory')
444 list = input_listdir('/sys/devices/system/cpu', ['cpu*/uevent'])
447 if re.match(r'cpu[0-9]+', f):
452 def parse_dmar_devscope(f):
453 (scope_type, scope_len, bus, dev, fn) = \
454 struct.unpack('<BBxxxBBB', f.read(8))
456 raise RuntimeError('Unsupported DMAR Device Scope Structure')
457 return (scope_type, scope_len, bus, dev, fn)
460 # parsing of DMAR ACPI Table
461 # see Intel VT-d Spec chapter 8
463 f = input_open('/sys/firmware/acpi/tables/DMAR', 'rb', True)
464 if get_cpu_vendor() == 'AuthenticAMD':
465 print('WARNING: AMD IOMMU support is not implemented yet')
467 signature = f.read(4)
468 if signature != b'DMAR':
469 if options.generate_collector:
471 raise RuntimeError('DMAR: incorrect input file format %s' % signature)
472 (length,) = struct.unpack('<I', f.read(4))
481 (struct_type, struct_len) = struct.unpack('<HH', f.read(4))
485 # DMA Remapping Hardware Unit Definition
487 (segment, base) = struct.unpack('<xxHQ', f.read(12))
489 raise RuntimeError('We do not support multiple PCI segments')
491 raise RuntimeError('Too many DMAR units. '
492 'Raise JAILHOUSE_MAX_DMAR_UNITS.')
494 offset += 16 - offset
495 while offset < struct_len:
496 (scope_type, scope_len, bus, dev, fn) =\
497 parse_dmar_devscope(f)
500 raise RuntimeError('We do not support more '
502 ioapic_id = (bus << 8) | (dev << 3) | fn
505 # Reserved Memory Region Reporting Structure
507 f.seek(8 - offset, os.SEEK_CUR)
509 (base, limit) = struct.unpack('<QQ', f.read(16))
513 while offset < struct_len:
514 (scope_type, scope_len, bus, dev, fn) =\
515 parse_dmar_devscope(f)
517 comments.append('PCI device: %02x:%02x.%x' %
520 comments.append('DMAR parser could not decode device path')
523 reg = MemRegion(base, limit, 'ACPI DMAR RMRR', comments)
526 f.seek(struct_len - offset, os.SEEK_CUR)
528 return units, ioapic_id, regions
533 f = input_open('/proc/ioports')
535 if line.endswith('ACPI PM_TMR\n'):
536 pm_timer_base = int(line.split('-')[0], 16)
543 def __init__(self, base, end_bus):
545 self.end_bus = end_bus
549 f = input_open('/sys/firmware/acpi/tables/MCFG', 'rb')
550 signature = f.read(4)
551 if signature != b'MCFG':
552 if options.generate_collector:
553 return MMConfig(0, 0)
554 raise RuntimeError('MCFG: incorrect input file format %s' %
556 (length,) = struct.unpack('<I', f.read(4))
558 raise RuntimeError('Multiple MMCONFIG regions found! '
559 'This is not supported')
561 (base, segment, start_bus, end_bus) = \
562 struct.unpack('<QHBB', f.read(12))
563 if segment != 0 or start_bus != 0:
564 raise RuntimeError('Invalid MCFG structure found')
565 return MMConfig(base, end_bus)
569 (options.generate_collector is False) and (options.root is '/')
570 and (os.geteuid() is not 0)
572 print('ERROR: You have to be root to work on "/"!', file=sys.stderr)
575 def get_cpu_vendor():
576 with input_open('/proc/cpuinfo', 'r') as f:
580 key, value = line.split(':')
581 if key.strip() == 'vendor_id':
585 (pcidevices, pcicaps) = parse_pcidevices()
587 product = [input_readline('/sys/class/dmi/id/sys_vendor',
589 input_readline('/sys/class/dmi/id/product_name',
593 inmatemem = kmg_multiply_str(options.mem_inmates)
594 hvmem = [0, kmg_multiply_str(options.mem_hv)]
596 regions = parse_iomem()
597 ourmem = parse_cmdline()
598 total = hvmem[1] + inmatemem
600 mmconfig = MMConfig.parse()
602 (dmar_units, ioapic_id, rmrr_regs) = parse_dmar()
605 # kernel does not have memmap region, pick one
607 ourmem = alloc_mem(regions, total)
608 elif (total > ourmem[1]):
609 raise RuntimeError('Your memmap reservation is too small you need >="' +
614 inmatereg = MemRegion(ourmem[0] + hvmem[1],
615 ourmem[0] + hvmem[1] + inmatemem - 1,
616 'JAILHOUSE Inmate Memory')
617 regions.append(inmatereg)
619 cpucount = count_cpus()
621 pm_timer_base = parse_ioports()
623 jh_enabled = input_readline('/sys/devices/jailhouse/enabled',
625 if options.generate_collector is False and jh_enabled == '1':
626 print('ERROR: Jailhouse was enabled when collecting input files! '
627 'Disable jailhouse and try again.',
631 f = open(options.file, 'w')
633 if options.generate_collector:
634 filelist = ' '.join(inputs['files'].union(inputs['dirs']))
635 filelist_opt = ' '.join(inputs['files_opt'])
637 tmpl = Template(filename=os.path.join(options.template_dir,
638 'jailhouse-config-collect.tmpl'))
639 f.write(tmpl.render(filelist=filelist, filelist_opt=filelist_opt))
641 tmpl = Template(filename=os.path.join(options.template_dir,
642 'root-cell-config.c.tmpl'))
643 f.write(tmpl.render(regions=regions,
645 argstr=' '.join(sys.argv),
648 pcidevices=pcidevices,
652 pm_timer_base=pm_timer_base,
654 dmar_units=dmar_units))